About 27,900 results
Open links in new tab
  1. Known Exploited Vulnerabilities Catalog - CISA

    For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains …

  2. CISA Adds Three Known Exploited Vulnerabilities to Catalog

    Jul 28, 2025 · CISA has added three new vulnerabilities to its KEV Catalog, based on evidence of active exploitation.

  3. Reducing the Significant Risk of Known Exploited Vulnerabilities

    Learn about the importance of CISA's Known Exploited Vulnerability (KEV) catalog and how to use it to help build a collective resilience across the cybersecurity community.

  4. 2023 Top Routinely Exploited Vulnerabilities - CISA

    Nov 12, 2024 · Technical Details Key Findings In 2023, malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks compared to 2022, allowing them …

  5. Critical Vulnerabilities in Microsoft Windows Operating Systems

    Jan 14, 2020 · An attacker could remotely exploit these vulnerabilities to decrypt, modify, or inject data on user connections: CryptoAPI spoofing vulnerability – CVE-2020-0601: This …

  6. CISA Adds One Known Exploited Vulnerability to Catalog

    Jul 10, 2025 · CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  7. Top Routinely Exploited Vulnerabilities Listed in Table 1 are the top 15 vulnerabilities the authoring agencies observed malicious cyber actors routinely exploiting in 2023 with details …

  8. Top Routinely Exploited Vulnerabilities - CISA

    Aug 20, 2021 · This advisory provides details on the top 30 vulnerabilities—primarily Common Vulnerabilities and Exposures (CVEs)—routinely exploited by malicious cyber actors in 2020 …

  9. 2021 Top Routinely Exploited Vulnerabilities - CISA

    Apr 28, 2022 · These vulnerabilities include multiple vulnerabilities affecting internet-facing systems, including Accellion File Transfer Appliance (FTA), Windows Print Spooler, and Pulse …

  10. Secure by Design Alert: Eliminating Buffer Overflow Vulnerabilities

    Feb 12, 2025 · This Secure by Design Alert is part of an ongoing series aimed at advancing industry-wide best practices to eliminate entire classes of vulnerabilities during the design and …